Cryptography is a cornerstone for the protection of the digital society, and security definitions lie at the heart of cryptographic research. Their importance stems from the fact that for a cryptographic scheme, in contract to its correctness, security cannot simply be demonstrated. Rather, the widely accepted paradigm is to build confidence by mathematically proving their security. This foremost requires to have a sound and meaningful mathematical security model, such that the implied guarantees actually correspond to the intended properties. The paradigm of provable security can be traced back to Shannon's seminal work on the one-time pad encryption. His custom-made and purely information-theoretic definition, however, does not handily...
International audienceWe present the first universally composable key-management functionality, form...
International audienceWe present the first universally composable key-management functionality, form...
The mission of theoretical cryptography is to define and construct provably secure cryptographic pro...
Computer-aided cryptography improves the rigor of security proofs by mechanizing their verification....
Ever since the foundational work of Goldwasser and Micali, simulation has proven to be a powerful an...
In this paper, we revisit formalizations of information-theoretic security for symmetric-key encrypt...
We formalize the simulation paradigm of cryptography in terms of category theory and show that proto...
We present a general framework for representing cryptographic protocols and analyzing their security...
Over the last two decades, there has been tremendous success in placing cryptog-raphy on a sound the...
Although they do not suffer from clear attacks, various key agreement protocols (for example that us...
Secure multi-party computation is a conceptual framework in which distrusting parties engage in a pr...
Universal composability is a framework for the specification and analysis of cryptographic protocols...
Secure multi-party computation is a conceptual framework in which distrusting parties engage in a pr...
Nowadays it is widely accepted to formulate the security of a protocol carrying out a given task via...
Nowadays it is widely accepted to formulate the security of a protocol carrying out a given task via...
International audienceWe present the first universally composable key-management functionality, form...
International audienceWe present the first universally composable key-management functionality, form...
The mission of theoretical cryptography is to define and construct provably secure cryptographic pro...
Computer-aided cryptography improves the rigor of security proofs by mechanizing their verification....
Ever since the foundational work of Goldwasser and Micali, simulation has proven to be a powerful an...
In this paper, we revisit formalizations of information-theoretic security for symmetric-key encrypt...
We formalize the simulation paradigm of cryptography in terms of category theory and show that proto...
We present a general framework for representing cryptographic protocols and analyzing their security...
Over the last two decades, there has been tremendous success in placing cryptog-raphy on a sound the...
Although they do not suffer from clear attacks, various key agreement protocols (for example that us...
Secure multi-party computation is a conceptual framework in which distrusting parties engage in a pr...
Universal composability is a framework for the specification and analysis of cryptographic protocols...
Secure multi-party computation is a conceptual framework in which distrusting parties engage in a pr...
Nowadays it is widely accepted to formulate the security of a protocol carrying out a given task via...
Nowadays it is widely accepted to formulate the security of a protocol carrying out a given task via...
International audienceWe present the first universally composable key-management functionality, form...
International audienceWe present the first universally composable key-management functionality, form...
The mission of theoretical cryptography is to define and construct provably secure cryptographic pro...